웹 개발자와 정보보안 입문자가 꼭 알아야 할 웹 해킹 & 시큐어 코딩
크리핵티브
정보보안 입문자와 웹 개발자 분들을 위한 웹 해킹 입문 강의! 본 강의를 시작으로 웹 해킹을 재미있게 시작해보세요!
초급
모의해킹, 인젝션
We will take a closer look at the working principles through core theories and practices of the OAuth 2.0 protocol. And we will analyze the OAuth 2.0 protocol from the perspective of hacking and security.
OAuth Basic Concepts
How OAuth works
OAuth Practice
OAuth Hacking and Security
OAuth is widely used for simple/social login!
Learn everything from concepts to practical application in one lecture 🙌
OAuth 2.0 authorization framework
Abbreviation for Open Authorization ,
About their information on other websites
An open standard for granting access rights.
It is currently being used and distributed in many web services.
You can examine the security threats that the OAuth 2.0 protocol may pose and learn in detail about various security methods.
Web developers implementing OAuth 2.0 will benefit from this course by becoming aware of the threats that exist.
A mock hacking expert will be able to diagnose which points and methods can be used in an environment where OAuth 2.0 is implemented, and what security measures can be taken.
We enhance your understanding through a detailed curriculum and PPT.
This step-by-step guide to OAuth protocol decomposition offers a much more in-depth and systematic approach than the OAuth-related knowledge widely available online. Furthermore, the PPT provides numerous tools to enhance learners' understanding, including detailed diagrams.
To understand OAuth, the theory alone is not enough.
You can perfect it with practice!
📢 No libraries! Implement the OAuth 2.0 protocol with pure PHP coding.
We're providing students with a security checklist for more effective OAuth 2.0 security audits! You can learn diagnostic methods and response strategies for each item in the "OAuth 2.0 Hacking and Security" course.
Thankfully, I have received many positive reviews of my lectures.
I believe this is the result of a lot of hard work put into creating each and every lecture! If you're hesitant about taking the course, trust me and take it!
Q. What basic knowledge would be helpful for taking this course?
It is recommended that you have some programming experience and have some basic knowledge of web technologies and web hacking.
Q. I am a web developer. Can I take the course?
Web developers already have basic web and programming knowledge, so they can easily take this course! If you need help with web hacking, the following courses will be of great help.
Q. Who will benefit from this course?
This course will be very helpful to both hacking experts and web developers, as it examines the OAuth 2.0 protocol from a hacking and security perspective.
Q. I am a job seeker or new employee in a security-related field. Will this be helpful for my work?
Of course, it helps! Many web services today use the OAuth 2.0 protocol. However, I recommend that you first take my other courses on web hacking and fully understand them before taking this course.
Q. I am a developer working on JAVA web application development. Will this be helpful?
You can use any language you like, but I chose PHP for its intuitiveness and ease of understanding the OAuth 2.0 protocol.
Q. Can I take the course even if I don't know PHP?
While a basic understanding of PHP is helpful, a basic understanding of programming is generally acceptable. This means that proficiency in languages other than PHP is also a plus.
Who is this course right for?
Anyone developing OAuth
Simulated Hacking Expert
Web Developer
Need to know before starting?
Experience using programming languages
25,760
Learners
1,345
Reviews
497
Answers
4.9
Rating
18
Courses
:: 국내 정보보안 솔루션 개발 기업 재직 ::
- 앱 위변조 방지 솔루션 : 미들웨어 담당 / 해킹 대회 운영진 / 국내 유명 해킹/방어 훈련장 제작
:: 국내 정보보안 전문 업체 재직 ::
- 블랙박스 모의해킹 / 시나리오 기반 모의해킹 / 웹 취약점 진단 / 모바일 취약점 진단 / 소스코드 취약점 진단 / APT 모의 훈련 / DDoS 모의훈련 / 인프라 진단 / 스마트 가전 진단
- 국내 대기업, 중소기업 다수 진단
:: 외부 교육 및 활동 ::
- 멀티캠퍼스, 국가 보안 기술 연구소(ETRI)
- 국내 정보보안 업체 : 재직자 대상 "웹 모의해킹 심화 교육" 진행중
- 해커팩토리 문제 제작
:: 취약점 발견 ::
1) Web Application Server 취약점
- TMAX JEUS : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
- IBM WebSphere(CVE-2020-4163) : 원격 명령어 실행 취약점(Remote Command Execution Vulnerability)
2) CMS(Contents Management System) 취약점
- 네이버 스마트에디터 : 파일 업로드 취약점
- 그누보드 : SQL Injection , 파일 업로드 취약점(그누보드4, 그누보드5), XSS ...
- 킴스큐 : 파리미터 변조 취약점 , 파일 업로드 취약점
* 이메일 : crehacktive3@naver.com
* 블로그 : http://www.crehacktive.co.kr
All
69 lectures ∙ (8hr 15min)
Course Materials:
All
8 reviews
3.9
8 reviews
$51.70
Check out other courses by the instructor!
Explore other courses in the same field!